Security & Encryption
azw3 |eng | 2017-09-08 | Author:Collins, Michael [Collins, Michael]
1 And I prefer to keep my Windows and Linux boxes physically wired. 2 Note that the prefix is the equivalent to a subnet’s netmask. 3 That doesn’t mean you ...
( Category:
Databases & Big Data
November 2,2017 )
azw3 |eng | 2017-08-10 | Author:Edward G. Amoroso & Matthew E. Amoroso
Figure 14-3. Three-Step TCP Handshake Between Client Browser and Website This so-called TCP/IP handshake provides the base communication on which most network security methods operate. The most common security method, ...
( Category:
Security & Encryption
November 2,2017 )
azw3 |eng | 2017-08-18 | Author:Lachance, Daniel & Clarke, Glen E. [Lachance, Daniel]
A QUICK ANSWER KEY 1. D 2. C 3. B 4. A 5. C 6. B, C 7. C, D, E 8. C 9. D 10. C 11. A 12. ...
( Category:
Security & Encryption
November 2,2017 )
azw3 |eng | 2017-09-08 | Author:Bell, Laura & Brunton-Spall, Michael & Smith, Rich & Bird, Jim [Bell, Laura]
If You Got Bugs, You’ll Get Pwned We know that there is a strong connection between code quality and security. The more bugs you have, the more security problems you ...
( Category:
Programming
November 2,2017 )
epub |eng | 2013-03-30 | Author:Slava Gomzin
More Communication Vulnerability Points Although LAN communication is probably the most convenient way to wiretap sensitive data, there are other possible methods related to communication. Communication Between POS and POI ...
( Category:
Internet & Social Media
October 31,2017 )
epub, mobi, pdf |eng | 2012-09-13 | Author:Cole Stryker [Stryker, Cole]
Do Not Track Since Jonathan Mayer was an undergrad, he’s split his time between public policy and computer security. One of his projects is the maintenance of DoNotTrack.Us, a Web ...
( Category:
Internet & Social Media
October 27,2017 )
epub, pdf |eng | 2004-10-24 | Author:Paul Graham [Graham, Paul]
Making wealth is not the only way to get rich. For most of human history it has not even been the most common. Until a few centuries ago, the main ...
( Category:
Internet & Social Media
October 24,2017 )
mobi, epub |eng | 2017-10-10 | Author:Andrew O'Hagan
The Satoshi Affair The Raid Ten men raided a house in Gordon, a north shore suburb of Sydney, at 1:30 p.m. on Wednesday, December 9, 2015. Some of the federal ...
( Category:
Security & Encryption
October 24,2017 )
epub |eng | 2012-12-28 | Author:O'Connor, TJ [O'Connor, TJ]
Running our script, we see several of our packets headed to Korea, London, Japan, and even Australia. This provides us quite a powerful analysis tool. However, Google Earth may prove ...
( Category:
Internet & Social Media
October 24,2017 )
mobi |eng | 2010-12-21 | Author:Christopher Hadnagy & Paul Wilson
Chapter 6 Influence: The Power of Persuasion If you would persuade, you must appeal to interest rather than intellect. —Benjamin Franklin The epigraph sums up this entire chapter. You might ...
( Category:
Internet & Social Media
October 24,2017 )
epub |eng | 2015-08-17 | Author:Bachaalany, Elias, Koret, Joxean & Elias Bachaalany
Dynamic Heuristic Engines Dynamic heuristic engines are implemented in the form of hooks (in userland or kernel-land) or based on emulation. The former approach is more reliable, because it involves ...
( Category:
Internet & Social Media
October 21,2017 )
epub |eng | 0101-01-01 | Author:Kevin D. Mitnick & William L. Simon [Mitnick, Kevin D. & Simon, William L.]
10_569597 ch06.qxd 1/11/05 9:20 PM Page 130 130 The Art of Intrusion Because of the nature of Biotech’s business, access to this information is strictly regulated by the Food and ...
( Category:
Internet & Social Media
October 17,2017 )
epub |eng | 0101-01-01 | Author:Timothy Mullen
508 PART III How to Own an Identity THE SPREADSHEET Robert stared at the spreadsheet. On the way home, he had admitted to himself that he had been hoping there ...
( Category:
Networking & Cloud Computing
October 17,2017 )
epub |eng | 2015-04-13 | Author:Christopher Hadnagy & Michele Fincher
My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category:
Networking & Cloud Computing
October 12,2017 )
epub, mobi, pdf |eng | 2014-10-18 | Author:Peter N.M. Hansteen
[32] From a longer-term perspective, it’s fairly normal for entire networks and larger ranges of IP addresses to be reassigned to new owners in response to events in the physical, ...
( Category:
Operating Systems
October 11,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6741)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6581)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6302)
Machine Learning Security Principles by John Paul Mueller(6273)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5948)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5908)
Solidity Programming Essentials by Ritesh Modi(4044)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3683)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3413)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3349)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3173)
Incident Response with Threat Intelligence by Roberto Martínez(2899)
Mobile App Reverse Engineering by Abhinav Mishra(2887)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2764)
